Passive decoy-state quantum key distribution with practical light sources

被引:63
作者
Curty, Marcos [1 ]
Ma, Xiongfeng [2 ,3 ]
Qi, Bing [4 ,5 ]
Moroder, Tobias [2 ,3 ,6 ,7 ]
机构
[1] Univ Vigo, Dept Signal Theory & Commun, ETSI Telecomunicac, E-36310 Vigo, Pontevedra, Spain
[2] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[4] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Phys, Toronto, ON M5S 3G4, Canada
[5] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[6] Univ Erlangen Nurnberg, Quantum Informat Theory Grp, Inst Theoret Phys 1, D-91058 Erlangen, Germany
[7] Max Planck Inst Sci Light, D-91058 Erlangen, Germany
基金
加拿大自然科学与工程研究理事会;
关键词
SECURITY;
D O I
10.1103/PhysRevA.81.022310
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.
引用
收藏
页数:15
相关论文
共 45 条
[11]   Quantum cryptography [J].
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Hendrych, Martin .
PROGRESS IN OPTICS, VOL 49, 2006, 49 :381-454
[12]   Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security [J].
Dynes, J. F. ;
Yuan, Z. L. ;
Sharpe, A. W. ;
Shields, A. J. .
OPTICS EXPRESS, 2007, 15 (13) :8465-8471
[13]  
FUNG CHF, ARXIV09100312
[14]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[15]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[16]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[17]  
HASEGAWA J, ARXIV07053081QUANTPH
[18]   Optimal ratio between phase basis and bit basis in quantum key distributions [J].
Hayashi, Masahito .
PHYSICAL REVIEW A, 2009, 79 (02)
[19]  
Horn R.A., 2012, Matrix analysis, DOI [10.1017/CBO9780511810817, DOI 10.1017/CBO9780511810817]
[20]   Quantum key distribution over a 48 km optical fibre network [J].
Hughes, RJ ;
Morgan, GL ;
Peterson, CG .
JOURNAL OF MODERN OPTICS, 2000, 47 (2-3) :533-547